General

  • Target

    5358c959a739e43deb4b3a898eb88392_JaffaCakes118

  • Size

    2.4MB

  • Sample

    240518-g3yxnsfe73

  • MD5

    5358c959a739e43deb4b3a898eb88392

  • SHA1

    2ab691c09199b054420b714ef6c423de973bae07

  • SHA256

    39b0e3bae557108fed5e0935b7a64b640009fe5b16fb4892f42b2335c5331509

  • SHA512

    66a229030934e80bd68886536e3f59392ee911174c8e2f0f1145cf3ad5c9ab54ae1ee31f48763e302aed1283b622715ad217d803a761c9ce3c137c06ad9df628

  • SSDEEP

    49152:Rmf4QS4CklIKXSk9xJhArW0OnO2V15vbHgvwoiBHgeUwTRd8I1Hcgp0XGz+e:RybAZwSUxJSwO2xHuiBHRz2Gz7

Malware Config

Targets

    • Target

      5358c959a739e43deb4b3a898eb88392_JaffaCakes118

    • Size

      2.4MB

    • MD5

      5358c959a739e43deb4b3a898eb88392

    • SHA1

      2ab691c09199b054420b714ef6c423de973bae07

    • SHA256

      39b0e3bae557108fed5e0935b7a64b640009fe5b16fb4892f42b2335c5331509

    • SHA512

      66a229030934e80bd68886536e3f59392ee911174c8e2f0f1145cf3ad5c9ab54ae1ee31f48763e302aed1283b622715ad217d803a761c9ce3c137c06ad9df628

    • SSDEEP

      49152:Rmf4QS4CklIKXSk9xJhArW0OnO2V15vbHgvwoiBHgeUwTRd8I1Hcgp0XGz+e:RybAZwSUxJSwO2xHuiBHRz2Gz7

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks